CVE-2007-3103

The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=185660
http://bugzilla.redhat.com/242903
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557 Patch
http://osvdb.org/40945
http://secunia.com/advisories/26056 Vendor Advisory
http://secunia.com/advisories/26081 Vendor Advisory
http://secunia.com/advisories/26282 Vendor Advisory
http://secunia.com/advisories/27240 Vendor Advisory
http://secunia.com/advisories/35674 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200710-11.xml
http://www.debian.org/security/2007/dsa-1342
http://www.redhat.com/support/errata/RHSA-2007-0519.html
http://www.redhat.com/support/errata/RHSA-2007-0520.html
http://www.securityfocus.com/archive/1/473869/100/0/threaded
http://www.securityfocus.com/bid/24888
http://www.securitytracker.com/id?1018375
https://exchange.xforce.ibmcloud.com/vulnerabilities/35375
https://issues.rpath.com/browse/RPL-1485
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802
https://www.exploit-db.com/exploits/5167
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html
http://bugs.gentoo.org/show_bug.cgi?id=185660
http://bugzilla.redhat.com/242903
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557 Patch
http://osvdb.org/40945
http://secunia.com/advisories/26056 Vendor Advisory
http://secunia.com/advisories/26081 Vendor Advisory
http://secunia.com/advisories/26282 Vendor Advisory
http://secunia.com/advisories/27240 Vendor Advisory
http://secunia.com/advisories/35674 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200710-11.xml
http://www.debian.org/security/2007/dsa-1342
http://www.redhat.com/support/errata/RHSA-2007-0519.html
http://www.redhat.com/support/errata/RHSA-2007-0520.html
http://www.securityfocus.com/archive/1/473869/100/0/threaded
http://www.securityfocus.com/bid/24888
http://www.securitytracker.com/id?1018375
https://exchange.xforce.ibmcloud.com/vulnerabilities/35375
https://issues.rpath.com/browse/RPL-1485
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802
https://www.exploit-db.com/exploits/5167
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora_core:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:32

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=185660 - () http://bugs.gentoo.org/show_bug.cgi?id=185660 -
References () http://bugzilla.redhat.com/242903 - () http://bugzilla.redhat.com/242903 -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557 - Patch () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557 - Patch
References () http://osvdb.org/40945 - () http://osvdb.org/40945 -
References () http://secunia.com/advisories/26056 - Vendor Advisory () http://secunia.com/advisories/26056 - Vendor Advisory
References () http://secunia.com/advisories/26081 - Vendor Advisory () http://secunia.com/advisories/26081 - Vendor Advisory
References () http://secunia.com/advisories/26282 - Vendor Advisory () http://secunia.com/advisories/26282 - Vendor Advisory
References () http://secunia.com/advisories/27240 - Vendor Advisory () http://secunia.com/advisories/27240 - Vendor Advisory
References () http://secunia.com/advisories/35674 - Vendor Advisory () http://secunia.com/advisories/35674 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200710-11.xml - () http://security.gentoo.org/glsa/glsa-200710-11.xml -
References () http://www.debian.org/security/2007/dsa-1342 - () http://www.debian.org/security/2007/dsa-1342 -
References () http://www.redhat.com/support/errata/RHSA-2007-0519.html - () http://www.redhat.com/support/errata/RHSA-2007-0519.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0520.html - () http://www.redhat.com/support/errata/RHSA-2007-0520.html -
References () http://www.securityfocus.com/archive/1/473869/100/0/threaded - () http://www.securityfocus.com/archive/1/473869/100/0/threaded -
References () http://www.securityfocus.com/bid/24888 - () http://www.securityfocus.com/bid/24888 -
References () http://www.securitytracker.com/id?1018375 - () http://www.securitytracker.com/id?1018375 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35375 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35375 -
References () https://issues.rpath.com/browse/RPL-1485 - () https://issues.rpath.com/browse/RPL-1485 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802 -
References () https://www.exploit-db.com/exploits/5167 - () https://www.exploit-db.com/exploits/5167 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html -

Information

Published : 2007-07-15 22:30

Updated : 2024-11-21 00:32


NVD link : CVE-2007-3103

Mitre link : CVE-2007-3103

CVE.ORG link : CVE-2007-3103


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • linux
  • enterprise_linux_desktop

fedoraproject

  • fedora_core
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')